• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

Can password managers get hacked? Right here’s what to know

Admin by Admin
November 15, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Look no additional to learn the way cybercriminals might attempt to crack your vault and how one can hold your logins secure

Phil Muncaster

13 Nov 2025
 • 
,
5 min. learn

How password managers can be hacked – and how to stay safe

The common web person has an estimated 168 passwords for his or her private accounts, in line with a research from 2024. That’s an enormous 68% improve on the tally 4 years beforehand. Given the safety dangers related to sharing credentials throughout accounts, and of utilizing simple-to-guess passwords, most of us need assistance managing these logins. That is the place password managers are available: enabling us to retailer and recall lengthy, sturdy and distinctive passwords for every of our on-line accounts.

Nonetheless, this doesn’t imply that these password vaults are a silver bullet or that it is best to decrease your vigilance on-line. Provided that they actually maintain the keys to our digital lives, they’ve additionally change into a well-liked goal for cybercriminals. Listed here are six potential dangers and a few concepts on how you can mitigate them.

6 password supervisor safety issues

With entry to the credentials saved in your password supervisor, risk actors might hijack your accounts to commit id fraud, or promote entry/passwords to others. That’s why they’re at all times in search of new methods to focus on you. Look out for the under:

1. Compromise of your grasp password

The great thing about password managers is that with a single, memorable password, you’ll be able to entry the vault that shops all your on-line credentials. Nonetheless, the issue with this strategy is that, if cybercriminals can pay money for that grasp password, they acquire the identical degree of entry. This might occur through a “brute-force” assault, the place they basically use automated instruments to attempt completely different passwords repeatedly till they lastly stumble on the appropriate one. An alternative choice is by exploiting vulnerabilities within the password supervisor software program, or tricking customers with phishing pages, as detailed under.

2. Phishing/rip-off advertisements

Risk actors have been identified to submit malicious advertisements to Google Search designed to lure victims to faux websites which harvest their e mail handle, grasp password and secret key (if relevant). The hazard with these advertisements is that they appear respectable and should seem within the search rankings if you Google your password supervisor. The phishing pages they’re linked to are spoofed to seem as if they’re the true deal. For instance a website could also be “the1password[.]com” or “app1password[.]com,” as a substitute of the unique “1password.com.” Or “appbitwarden[.]com” as a substitute of “bitwarden.com.” Should you click on by to such a web page, you’ll be taken to a legitimate-looking login web page designed to steal your all-important password supervisor logins.

3. Password-stealing malware

Cybercriminals are nothing if not resourceful. Such are the riches on supply that some have gone to the difficulty of creating malware to steal credentials from victims’ password managers. ESET researchers lately noticed one such try by a North Korean state-sponsored marketing campaign dubbed “DeceptiveDevelopment.” It discovered that “InvisibleFerret” malware which featured a backdoor command able to exfiltrating information from each browser extensions and password managers through Telegram and FTP. Among the many password managers focused have been 1Password and Dashlane.

On this specific case, the malware was hidden in information downloaded by the sufferer as a part of an elaborate faux job interview course of. However there’s no cause why malicious code with comparable properties couldn’t be unfold in different methods, corresponding to through e mail, textual content or social media.

4. A password supervisor vendor breach

Password supervisor distributors know they’re a serious goal for risk actors. That’s why they spend important time and sources making their IT environments as safe as potential. However they solely must make one mistake to probably let the dangerous guys in. In 2022, this worst-case state of affairs occurred to LastPass. Digital thieves compromised a LastPass engineer’s laptop computer to entry the agency’s improvement atmosphere. There they stole supply code and technical paperwork containing credentials, which enabled them to entry buyer information backups.

This included clients’ private and account data, which may very well be used for follow-on phishing assaults. A listing of all web site URLs of their vaults. And usernames and passwords for all clients. Though these have been encrypted, the hacker was capable of “brute pressure” them (as mentioned above). That is thought to have led to an enormous US$150 million crypto-heist and is a cautionary story that even the best-protected distributors might generally get breached.

5. Pretend password supervisor apps

Typically, cybercriminals play on the recognition of password managers in an try to reap passwords and unfold malware through faux apps. Even Apple’s usually safe App Retailer allowed certainly one of these malicious password supervisor apps to be downloaded by customers final 12 months. These threats are usually designed to steal that all-important grasp password, or else obtain information-stealing malware to the person’s gadget.

6. Vulnerability exploitation

Password managers are in the end simply software program. And software program, being written (principally) by people, inevitably comprises vulnerabilities. If a cybercriminal manages to seek out and exploit certainly one of these bugs, they can elevate credentials out of your password vault. Alternatively, they might goal vulnerabilities in password supervisor plugins for net browsers to steal credentials and even two-factor authentication (2FA) codes. Or they might goal gadget working methods to do the identical. The extra units you’ve got your password supervisor downloaded to, the extra alternative they’ve to take action.

The best way to safe your password supervisor utilization

To protect in opposition to the threats listed above, think about the next:

  • Consider a safe, lengthy and distinctive grasp passphrase. Contemplate 4 memorable phrases separated by hyphens. It will make it more durable for an attacker to “brute pressure” it.
  • At all times improve the safety of your accounts by switching on 2FA. Because of this even when hackers pay money for your passwords, they will be unable to entry your accounts with out the second issue.
  • Hold browsers, password managers and working methods updated so they’re on essentially the most safe variations. This reduces the alternatives for vulnerability exploitation.
  • Solely obtain apps from a respectable app retailer (Google Play, App Retailer) and test the developer and app score earlier than doing so, in case they’re faux/malicious apps.
  • Solely select a password supervisor from a good vendor. Store round till you discover one you’re snug with.
  • Make sure you set up safety software program from a good vendor on all units, to mitigate the specter of assaults designed to steal passwords instantly out of your password supervisor.

Password managers stay a key a part of cybersecurity greatest apply. However provided that you are taking further precautions. Safety dangers are at all times evolving, so keep abreast of the present risk developments to make sure your on-line credentials keep beneath lock and key.

Tags: hackedHeresmanagersPassword
Admin

Admin

Next Post
Construct a biomedical analysis agent with Biomni instruments and Amazon Bedrock AgentCore Gateway

Construct a biomedical analysis agent with Biomni instruments and Amazon Bedrock AgentCore Gateway

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

ChatGPT Advertisements and the Ethics of AI Monetization

ChatGPT Advertisements and the Ethics of AI Monetization

February 10, 2026
New Cybercrime Group 0APT Accused of Faking Tons of of Breach Claims

New Cybercrime Group 0APT Accused of Faking Tons of of Breach Claims

February 10, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved